PROTECTING AGAINST COUNTERFEIT ELECTRONICS DEVICES
First Claim
1. In a first device connected with a second device, a method of authenticating the first device, the method comprising:
- receiving a first cryptographic key at the first device, wherein the second device has a complementary second cryptographic key;
receiving a data string in a first predetermined memory location, wherein the data string is a random or pseudo-random data string and wherein the data string has a first cryptographic state;
changing the first cryptographic state of the data string to a second cryptographic state with the first cryptographic key; and
writing the data string having the second cryptographic state to a second predetermined memory location.
5 Assignments
0 Petitions
Accused Products
Abstract
An optical transceiver module is authenticated in a host system. A host generates a data string and writes the data string to a first predetermined memory location known to the transceiver. The data string is cryptographically altered (either encrypted or decrypted) by the transceiver and written to a second predetermined memory location known to the host. The host retrieves the cryptographically altered data string and performs a complementary cryptographic operation (either a decryption or encryption, respectively) thereon, creating a resulting data string. If the resulting data string is equal to the data string written to the first predetermined memory location, the transceiver is authenticated. The host and the transceiver may switch roles, with the transceiver generating the data string, the host cryptographically altering it, and so on. The host encrypts data strings when the transceiver decrypts data strings, and vice versa.
-
Citations
21 Claims
-
1. In a first device connected with a second device, a method of authenticating the first device, the method comprising:
-
receiving a first cryptographic key at the first device, wherein the second device has a complementary second cryptographic key; receiving a data string in a first predetermined memory location, wherein the data string is a random or pseudo-random data string and wherein the data string has a first cryptographic state; changing the first cryptographic state of the data string to a second cryptographic state with the first cryptographic key; and writing the data string having the second cryptographic state to a second predetermined memory location. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of authenticating a first device connected with a second device, the method comprising:
-
receiving a first key that can be used to decrypt and/or encrypt a data string, wherein a first device has a complementary second key that can be used to encrypt and/or decrypt the same data string; authenticating the first device at least once, wherein a different data string is used for each authentication of the first device, by performing; generating a first data string; writing the first data string to a first memory location, the first data string having a first cryptographic state; retrieving the first data string from a second memory location, wherein the first cryptographic state of the first data string has been changed to a second cryptographic state; changing the second cryptographic state of the first data string to a third cryptographic state; comparing the first cryptographic state with the third cryptographic state, wherein the first device is authenticated if the first cryptographic state matches the third cryptographic state. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. In a first device connected to a second device, a method of authenticating the second device, the method comprising:
-
receiving an encryption key, wherein a second device has an identical encryption key; providing a first data string to the second device, wherein the first data string is a random or pseudo-random data string; receiving a first encrypted data string from the second device; generating a second encrypted data string by encrypting a second data string, wherein the second data string and the first data string are identical; and comparing the first encrypted data string and the second encrypted data string, wherein the second device is authenticated if the first encrypted data string and the second encrypted data string are identical. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification